website/src/app/kb/use-cases/nat-gateway/readme.mdx
import SupportOptions from "@/components/SupportOptions"; import Link from "next/link"; import Alert from "@/components/DocsAlert"; import Image from "next/image"; import PlanBadge from "@/components/PlanBadge";
<PlanBadge plans={["starter", "team", "enterprise"]}>
In this guide, we'll walk through the configuration required to use Firezone to route traffic through a public IP address, sometimes known as a NAT Gateway configuration.
Use this when you need your team's traffic to appear to come from a single, static IP address to use services that require source traffic to come from specified IP allowlists.
After completing this guide, your team's traffic will be routed to a Firezone Gateway and then out to the internet using its public IP address.
<Alert color="info"> See our our [Terraform examples](/kb/automate/terraform) for a high availability example of this guide using Terraform on Google Cloud Platform. </Alert>Sites -> <site> and
click the Add Resource button.*.gitlab.company.com to appear to come from your
Gateway's public IP address, you would enter *.gitlab.company.com as the
Resource address.ifconfig.net to the Site as well.
This will be used later to verify that your traffic is being routed through
the Gateway's public IP.Policies tab, click the Add Policy button.That's it!
If you added the ifconfig.net Resource above, you can verify that your traffic
is being routed through the Gateway by visiting https://ifconfig.net in your
browser and ensuring the IP displayed matches the public IP address of your
Gateway.